DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


Some Terminologies You Should Know About Trojans

Some Terminologies You Should Know About Trojans


In this following post we will discus some most frequently used terminologies that we usually hear when word Trojan pops out. They are discussed here because after knowing them you'll be able to understand how attacker manages to circulate RAT server, hide its presence and also bypasses firewall rules.

How To Put A Windows PC In Continues Restart Mode

How To Put A Windows PC In Continues Restart Mode


As a college student I was very insincere and irregular, I always used to find out ways to skip lectures and practicals and that's why I am crappy programmer today. I created this trick to skip practicals while in college but I 'll advise you never do that, if you want to skip, skip lectures but practicals never. Ok here's the trick.

Trojan Horse

Trojan Horse


The word Trojan horse has been derived from Greek mythology in which Greeks built a huge wooden horse for their soldiers to hide and then placed that horse in front of Troy gates. Troy citizen thought its is gift to them for victory over Greeks and thus Greeks soldiers successfully bypassed the huge wall of Troy and destroyed it.

A Look On Some Of The Classic Windows Rootkits

A Look On Some Of The Classic Windows Rootkits


In this post we will discus some of the classic windows based rootkits and please note that this discussion will be study based. I don't guarantee these rootkits will work as it is as they worked before. By the way lets continue I hope you'll take little interest in understanding what these rootkits were able to do, so that when you'll need to plant or detect a rootkit manually you should not find its not your piece of cake

John The Ripper | Tutorial

John The Ripper | Tutorial


John The Ripper | Misc Options

John The Ripper | Misc Options


Ok this is last part to John The Ripper tutorial and here we will discus some of the misc features of John The Ripper. John The Ripper can crack many types of password encryption formats if you know by which format the password is encrypted, you can force John The Ripper to break password only in that format, by default it tries all possibilities.

Rootkit Revealed

Rootkit Revealed


As mentioned earlier rootkits have been associated with UNIX then Linux and today even with windows. Here in this post we will discuss tools and programs that are bundled with rootkits and their functions in short. The main job of rootkit is to provide an attacker unauthorized access to compromised system.

How To Hide An Installed Program In Windows

How To Hide An Installed Program In Windows


In this post I will show you how you can hide an installed program from others in your system. I was in college when I created this trick to disallow my friends from playing games on my PC. I hope you 'll find this trick helpful. So, here's the trick,

John The Ripper | Managing Sessions

John The Ripper | Managing Sessions


In previous posts we discussed about how to compile and crack passwords using John the ripper. Here we will discus how to mange password cracking sessions. In this section we will learn how we can pause John The Ripper while cracking and resume from where we left it while pausing.

Rootkit

Rootkit


The biggest disadvantage of any Operating System is that its Administrator User name is always known. Root for Unix\Linux and Administrator for Windows. The term Root-Kit is made up of two words Root and Kit. Where root refers to administrator and kit refers to group of programs. In all a RootKit is a malicious code or group of malicious code,

How To Dump Windows Password Using Pwdump

How To Dump Windows Password Using Pwdump


In previous post about dumping password I have just discussed about pwdump but haven't provided any tutorial. In this post I am providing most basic tutorial on using pwdump. You don't need to worry about any other options than what I ll discuss here since you will never face any problem even if you never use them

John The Ripper | Cracking Password

John The Ripper | Cracking Password


Now as we have covered compilation and basics of John The Ripper its time for real password cracking. Now note that password cracking in John The Ripper depends on type of hash obtained. That means if you have obtained UNIX password hash then John The Ripper will crack it without problem, hash obtained from pwdump, then also John The Ripper will crack it without problem but if you have password hash encrypted like shadowing or hash obtained from authentication server

How To Hack Facebook Account | Key Logger

How To Hack Facebook Account | Key Logger


Key-loggers or keystroke loggers are programs that can log keystrokes and save them as log files or send them via emails or ftp to the person who has installed key-logger. It can record date and time of application which was opened and capture what was typed in it may it be notepad, wordpad, MS word or any website URL, user name, password

John The Ripper: Beginner's Tutorial

John The Ripper: Beginner's Tutorial


In previous post on John The Ripper we saw how to compile it for Linux and UNIX boxes. Now its time to begin out password cracking journey with John The Ripper. As you already know main task of John The Ripper is cracking and auditing weak user accounts on UNIX and UNIX like systems you will need /etc/passwd , /etc/shadow and /etc/expired files from the UNIX or Linux box whose passwords you want to crack or audit.

John The Ripper | Compilation

John The Ripper | Compilation


John The Ripper is one of the best command line password cracker available today. Its primary purpose is to detect weak passwords for UNIX and UNIX like systems thus helping UNIX network administrator to audit weak passwords. It officially supports several UNIX and Linux systems along with windows.

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security